Skip to main content
Log in

A general framework for secure biometric hashing against reconstruction attacks

  • Published:
Applied Intelligence Aims and scope Submit manuscript

Abstract

Binary representation is a popular privacy-preserving biometric recognition approach. However, it is vulnerable to similarity-based reconstruction attacks (i.e., similarity attacks) due to its similarity-preserving property. In this paper, the cause of this security threat is studied, a sufficient condition for secure anti-similarity-attack hashing (ASAH) is derived, and the definition of the ASAH manifold is provided. Moreover, a general framework is proposed for employing a statistical manifold to locate a secure hash function in a given hash function family. Specifically, a secure hash function can be obtained by finding the point that is closest to the ASAH manifold in the hash function family manifold. A generalized expectation-maximization-based algorithm is then developed to optimize this process. In addition, a case study is presented to clarify the implementation details of the aforementioned algorithm. In particular, an ideal ASAH submanifold is constructed through random generation to enhance the feasibility of the proposed framework, enabling ideal hash code generation. In addition, the generative adversarial network framework is adopted to generate high-quality hash codes; the distribution of these hash codes is close to that of the ideal hash codes. We perform experiments on public biometric datasets to verify that our approach can achieve both superior recognition performance and higher security under reconstruction attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Algorithm 1
Fig. 1
Fig. 2
Fig. 3
Algorithm 2
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Wei W, Wang J, Yan Z, Ding W (2022) Epmdroid: efficient and privacy-preserving malware detection based on sgx through data fusion. Inform Fus 82:43–57

    Article  Google Scholar 

  2. Stallings W (2019) Cryptography and network security: principles and practice, 8th edn, vol 6. Pearson

  3. Albrecht M, Chase M, Chen H, Ding J, Goldwasser S, Gorbunov S, Halevi S, Hoffstein J, Laine K, Lauter K, Lokam S, Micciancio D, Moody D, Morrison T, Sahai A, Vaikuntanathan V (2018) Homomorphic encryption security standard. Technical report, HomomorphicEncryption.org. Toronto, Canada

    Google Scholar 

  4. Ajay K (2020) A survey on secure communication techniques for 5g wireless heterogeneous networks. Inform Fus 62:89–109

    Article  Google Scholar 

  5. Kumar S, Gupta A, Walia GS (2020) Reversible data hiding: a contemporary survey of state-of-the-art, opportunities and challenges. Applied Intelligence

  6. Morampudi MK, Prasad MVNK, Raju USN (2021) Privacy-preserving and verifiable multi-instance iris remote authentication using public auditor. Appl Intell 51:6823–6836

    Article  Google Scholar 

  7. Boufounos PT (2012) Universal rate-efficient scalar quantization. IEEE Trans Inf Theory 58 (3):1861–1872

    Article  MathSciNet  MATH  Google Scholar 

  8. Chen Y, Wo Y, Xie R, Chudan W u, Han G (2019) Deep secure quantization: on secure biometric hashing against similarity-based attacks. Signal Process 154:314–323

    Article  Google Scholar 

  9. Fei L, Zhang B, Tian C, Teng S, Wen J (2021) Jointly learning multi-instance hand-based biometric descriptor. Inform Sci 562:1–12

    Article  MathSciNet  Google Scholar 

  10. Jin ATB, Ling DNC, Goh A (2004) Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recogn 37(11):2245–2255

    Article  Google Scholar 

  11. Tarek M, Hamouda E, Abohamama AS (2022) Multi-instance cancellable biometrics schemes based on generative adversarial network. Appl Intell, 52

  12. Portêlo J, Raj B, Abad A, Trancoso I (2014) Privacy-preserving speaker verification using secure binary embeddings. In: 2014 37th International convention on information and communication technology, electronics and microelectronics (MIPRO), pp 1268–1272

  13. Yang W, Wang S, Hu J, Zheng G, Yang J, Valli C (2019) Securing deep learning based edge finger vein biometrics with binary decision diagram. IEEE Trans Industr Inform 15(7):4244–4253

    Article  Google Scholar 

  14. Feng YC, Lim M-H, Yuen PC (2014) Masquerade attack on transform-based binary-template protection based on perceptron learning. Pattern Recogn 47(9):3019–3033

    Article  Google Scholar 

  15. Kaplan E, Gursoy ME, Nergiz ME, Saygin Y (2020) Known sample attacks on relation preserving data transformations. IEEE Trans Depend Sec Comput 17(2):443–450

    Article  Google Scholar 

  16. Lai Y, Jin Z, Wong KS, Tistarelli M (2021) Efficient known-sample attack for distance-preserving hashing biometric template protection schemes. IEEE Trans Inform Forens Secur 16:3170–3185

    Article  Google Scholar 

  17. Wang Y, Ward R, Wang ZJ (2019) Coarse-to-fine image dehashing using deep pyramidal residual learning. IEEE Signal Process Lett 26(9):1295–1299

    Article  Google Scholar 

  18. Wang Y, Palangi H, Jane Wang Z, Wang H (2018) Revhashnet: perceptually de-hashing real-valued image hashes for similarity retrieval. Signal Process Image Commun 68:68–75

    Article  Google Scholar 

  19. Wu Z, Ke M, Wo Y, Zhong X (2022) Masquerade attack on biometric hashing via biohashgan. The Visual Computer

  20. Wang J, Zhang T, song J, Sebe N, Shen HT (2018) A survey on learning to hash. IEEE Trans Pattern Anal Mach Intell 40(4):769–790

    Article  Google Scholar 

  21. Wang M, Zhou W, Tian Q, Li H (2018) A general framework for linear distance preserving hashing. IEEE Trans Image Process 27(2):907–922

    Article  MathSciNet  MATH  Google Scholar 

  22. Qi L i, Sun Z, He R, Tan T (2020 ) A general framework for deep supervised discrete hashing. Int J Comput Vis 128:2204–2222

    Article  MathSciNet  MATH  Google Scholar 

  23. Yuan L, Wang T, Zhang X, Tay FE, Jie Z, Liu W, Feng J (2020) Central similarity quantization for efficient image and video retrieval. In: 2020 IEEE/CVF Conference on computer vision and pattern recognition (CVPR), pp 3080–3089

  24. Teoh ABJ, Goh A, Ngo DCL (2006) Random multispace quantization as an analytic mechanism for biohashing of biometric and random identity inputs. IEEE Trans Pattern Anal Mach Intell 28(12):1892–1901

    Article  Google Scholar 

  25. Shun-ichi A (2016) Information geometry and its applications. Springer, Japan

    MATH  Google Scholar 

  26. Amari S-i, Tsuchiya N, Oizumi M (2018) Geometry of Information Integration: On the Occasion of Shun-ichi Amari’s 80th Birthday, IGAIA IV Liblice, Czech Republic, June 2016, pp 3–17. 01

  27. Goodfellow IJ, Pouget-Abadie J, Mirza M, Bing X u, Warde-Farley D, Ozair S, Courville A, Bengio Y (2014) Generative adversarial nets. In: Proceedings of the 27th international conference on neural information processing systems - vol 2, NIPS’14. MIT Press, Cambridge, pp 2672–2680

  28. Salimans T, Goodfellow I, Zaremba W, Cheung V, Radford A, Chen X (2016) Improved techniques for training gans. In: Proceedings of the 30th international conference on neural information processing systems, NIPS’16. Curran Associates Inc, Red Hook, pp 2234–2242

  29. Isola P, Zhu J, Zhou T, Efros AA (2017) Image-to-image translation with conditional adversarial networks. In: 2017 IEEE Conference on computer vision and pattern recognition (CVPR), pp 5967–5976

  30. Casia-irisv4-interval iris image database, http://biometrics.idealtest.org/#/datasetDetail/4

  31. Huang GB, Ramesh M, Berg T, Learned-Miller E (2007) Labeled faces in the wild: a database for studying face recognition in unconstrained environments. Number 07–49

  32. Casia palmprint database, http://biometrics.idealtest.org/#/datasetDetail/5

  33. He K, Zhang X, Ren S, Sun J (2016) Deep residual learning for image recognition. In: 2016 IEEE Conference on computer vision and pattern recognition (CVPR), pp 770–778

  34. Deng J, Dong W, Socher R, Li L, Li K, Li F-F (2009) Imagenet A large-scale hierarchical image database. In: 2009 IEEE Conference on computer vision and pattern recognition, pp 248–255

  35. Gomez-Barrero M, Galbally J, Rathgeb C, Busch C (2018) General framework to evaluate unlinkability in biometric template protection systems. IEEE Trans Inform Forens Secur 13(6):1406–1420

    Article  Google Scholar 

  36. security I (2022) cybersecurity and privacy protection — biometric information protection. ISO/IEC 24745:2022

  37. Kumar N, Manisha (2022) Cbrw: a novel approach for cancelable biometric template generation based on 1-d random walk. Appl Intell, 546

  38. Mai G, Cao K, Lan X, Yuen PC (2021) Secureface: face template protection. IEEE Trans Inform Forens Secur 16:262–277

    Article  Google Scholar 

Download references

Acknowledgements

This work is supported by National Natural Science Foundation of Guangdong [Grant No. 2021A1515012020], and Guangzhou science and technology plan project [Grant No.202002030298].

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yan Wo.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yu, L., Wo, Y. A general framework for secure biometric hashing against reconstruction attacks. Appl Intell 53, 12811–12830 (2023). https://doi.org/10.1007/s10489-022-04153-4

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10489-022-04153-4

Keywords

Navigation